Remove Data Remove Evaluation Remove White Paper
article thumbnail

The Hard Truths of Data Security in the Public Sector

FedInsider

Tuesday, October 10, 2023 | 2:00PM EDT | 1 Hour | Training Certificate The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. As a Cyber Leader in the U.S

Data 97
article thumbnail

After an Attack: Cyber Recovery Best Practices for State & Local Agencies

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Trust is Needed to Win the Cyber War

FedInsider

Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.

article thumbnail

Learning from Log4j: How to Keep Government Applications Secure (E127)

FedInsider

More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors- who with a little compromised code began opening extremely hard to find doors to sensitive data. Close Chief Security Officer, Delaware Dept.

article thumbnail

Thoughts on the AI Safety Summit from a public sector procurement & use of AI perspective

How to Crack a Nut

There seemed to be some recognition of the need for more State intervention through regulation, for more regulatory control of standard-setting, and for more attention to be paid to testing and evaluation in the procurement context. Public procurement is an opportunity to put into practice how we will evaluate and use technology.’

article thumbnail

Cloud Architecture Matters: Improve Cloud Security by Writing Natively to the Cloud

FedInsider

Tuesday, March 26, 2024 | 11:00AM EDT | 1 Hour | 1 CPE As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security.

article thumbnail

Zero Trust Needed to Win the Cyber War (E157)

FedInsider

From January 2020 to January 2022, La Monte served as CISO for HHS’s Office of Inspector General (OIG) where he spearheaded a multidisciplinary cybersecurity team comprised of IT professionals, auditors, evaluators, investigators and attorneys focused on combatting cybersecurity threats within HHS and the healthcare industry.